Abstract is missing.
- A Clustering Algorithm Based on Weighted Distance and User Preference of Incorporating Time FactorsWenjie Li, Hua Xue. 1-6 [doi]
- Terrorist Network Analysis and Identification of Main Actors Using Machine Learning TechniquesJawairia Rasheed, Usman Akram, Ahmed Kamran Malik. 7-12 [doi]
- Automated CV Analyzing and Ranking Tool to Select Candidates for Job PositionsT. C. Sandanayake, G. A. I. Limesha, T. S. S. Madhumali, W. P. I. Mihirani, M. S. A. Peiris. 13-18 [doi]
- Misspelling Error Detection in Thai Language ApplicationPatsaraporn Somboonsak. 19-24 [doi]
- Detecting Adversarial Perturbations with SalienyChiliang Zhang, Zhimou Yang, Zuochang Ye. 25-30 [doi]
- Lexicon-based Sentiment Analysis with Pattern Matching Application using Regular Expression in AutomataJennifer O. Contreras, Melvin A. Ballera, Ace C. Lagman, Jennalyn G. Raviz. 31-36 [doi]
- Measure and Analysis of Influence Factors of Inbound Tourism Level in Shaanxi Based on Panel Data ModelWei-Zhong Yan, Jia Kang, Ding-Wen Zhang. 37-41 [doi]
- The Implications of Big Data Analytics Orientation upon DeploymentYouyung Hyun, Ryuichi Hosoya, Taro Kamioka. 42-48 [doi]
- Finding Insights through Interactive VisualizationKai Sheng Teong, Yong En Tan, Mehlam Shabbir, Sook Ling Chua, Lee Kien Foo. 49-53 [doi]
- Research on the Transformation and Upgrading Path and Selection of Traditional Industries from the Perspective of Big DataYonghong Li, Shuwen Zhang, Nan Jia. 54-59 [doi]
- Design and Process Metamodels for Modelling and Verification of Safety-Related Software Applications in Smart Building SystemsMurni Fatehah, Vitaliy Mezhuyev. 60-64 [doi]
- Application of an Improved Combinatorial Test Strategy in Test Case Generation for Aviation SoftwareXiaohan Qiu, Hua Jing, Wei Zhang. 65-69 [doi]
- Interactive online tool as an instrument for learning mathematics through programming techniques, aimed at high school studentsWilver Auccahuasi, Grisi Bernardo Santiago, Elizabeth Oré Núñez, Fernando Sernaque. 70-76 [doi]
- Reconstruct the Scope, Content and Approaches of Computational LinguisticsQi Li, ZhiCheng Ma, Shibo Yang, Xianbo Li, Zhixin Ma, Xinlei Wei. 77-81 [doi]
- New Reversible Computing Algorithms for Shortest Paths ProblemLanying Guo, Chao Peng, Cheng He. 82-87 [doi]
- On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve CryptographyHsiao-Ling Wu, Chin-Chen Chang 0001, Long-Sheng Chen. 88-91 [doi]
- Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension FieldAli Md. Arshad, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza. 92-96 [doi]
- Characterizing Realistic Signature-based Intrusion Detection BenchmarksMonther Aldwairi, Mohammad A. Alshboul, Asmaa Seyam. 97-103 [doi]
- Security Mechanism Improvement for 2D Barcodes using Error Correction with Random SegmentationGongliang Wang, Zhenguo Yang, Junhong Chen, Kanoksak Wattanachote, Wenyin Liu. 104-109 [doi]
- A Speech and Lip Authentication System Based On Android Smart PhoneXinman Zhang, Jiayu Zhang, Tingting He, Lydia Yiyu Chen, Yuanjun Shen, Xuebin Xu. 110-114 [doi]
- Adaptive Network Tools and Services Network Topology MapperGodwin S. Monserate, Juliet S. Mendez. 115-119 [doi]
- Smart Home Technologies: A Preliminary ReviewSumathi Balakrishnan, Hemalata Vasudavan, Raja Kumar Murugesan. 120-127 [doi]
- Conceptual Framework of a Fuzzy Logic Forecasting Decision-Support System for Diaper Purchase to be Used in an Internet of Things environmentSarawut Ramjan. 128-133 [doi]
- Deployment of IoT-based honeynet modelZakariya Ammar, Ahmad Alsharif. 134-139 [doi]
- IoT Lotto: Utilizing IoT Devices in Brute-Force AttacksMohammed M. Alani. 140-144 [doi]
- A Secure and Privacy-preserving Internet of Things Framework for Smart CityMoussa Witti, Dimitri Konstantas. 145-150 [doi]
- User Perceptions in Adopting Cloud Computing in Autonomous VehicleHemalata Vasudavan, Kamalanathan Shanmugam, Harith Abdilaziz Ahmada. 151-156 [doi]
- Using a Modified Approach of Blowfish Algorithm for Data Security in Cloud ComputingReynaldo R. Corpuz, Bobby D. Gerardo, Ruji P. Medina. 157-162 [doi]
- Sustainable Data Management Strategies and Systems in Untrust Cloud EnvironmentsHuafei Zhu, Wee Keong Ng. 163-167 [doi]
- An Overview of Multimode Biometric Recognition TechnologyKunlei Jing, Xinman Zhang, Xuebin Xu. 168-172 [doi]
- Fatigue Driving Detection Based on Facial FeaturesXun Liang, Yanni Shi, Xiaoyu Zhan. 173-178 [doi]
- An MD5-Hirose Hashing Algorithm for Digital Image WatermarkingFlorence Jean B. Talirongan, Ariel M. Sison, Ruji P. Medina. 179-183 [doi]
- Ensemble Clustering by Noise-Aware Graph DecompositionMansheng Chen, Dong Huang, Mingkai He, Chang-Dong Wang. 184-188 [doi]
- Application of Binocular Vision Algorithm Based on Angle Measuring in Moving Target Tracking SystemJianying Wang, Shi Fei, Zhao Qiang. 189-193 [doi]
- Video Content Annotation Method Based on Multi-weight Multi-source Transfer LearningWenbi Rao, Yongqiang Tan, Yao Tan. 194-198 [doi]
- SUGPO: A White Spot Disease Detection in Shrimps Using Hybrid Neural Networks with Fuzzy Logic AlgorithmAleta C. Fabregas, Debrelie Cruz, Mark Daniel Marmeto. 199-203 [doi]
- A New Method for License Plate Character Detection and RecognitionHendry, Rung Ching Chen. 204-208 [doi]
- Single Biometric Recognition Research: A SummaryXinman Zhang, Qi Xiong, Xuebin Xu, Zhiyuan Ma. 209-213 [doi]
- A New Advanced Encryption Standard-Butterfly Effect in Protecting Image of Copyright PiracyHidear Talirongan, Ariel M. Sison, Ruji P. Medina. 214-218 [doi]
- An Evaluation Model Based on Product Characteristics for End-Delivery Choice in China e-Commerce ServicesI-Ching Lin, Han-Chi Fu, Sheng-Hung Chang, Kaijun Leng. 219-223 [doi]
- BANN: A Framework for Aspect-Level Opinion MiningWei Quan, Zheng Chen, Xiaohua Tony Hu. 224-228 [doi]
- Smart Healthcare Expert System with Medicine DispenserShivam Kumar, N. Ruban. 229-234 [doi]
- Self-Assessment of the Maturity of Management Information Systems-Business AlignmentDorota Jelonek. 235-239 [doi]
- A Comparative Study of Broadband Policy between China and the United States: Based on a "Tool-Welfare" Analysis FrameworkXikai Tang, Zepeng Gong. 240-244 [doi]
- Personality Learning Analytics System in Intelligent Virtual Learning EnvironmentSupparang Ruangvanich, Prachyanun Nilsook. 245-250 [doi]
- Bi-Directional Self-Organization Technique for Enhancing the Genetic AlgorithmK. Dinesh, R. Subramanian, Ibrahim Dweib, M. Nandhini, Mohamed Yasin Noor Mohamed, R. Rajakumar. 251-255 [doi]
- Proposal for a Course Support System for Database ExercisesRimpei Kunimoto, Hiroyuki Hisamatsu. 256-260 [doi]
- Fault Feature Extraction of Wind Turbine Gearbox Based on Improved Singular Value Decomposition and Noise ReductionZhaopeng Xu, Jinpei Li, Runfei Li, Ye Tian, Peng Du, Zhongbao Feng. 261-266 [doi]
- Development of Converted Deterministic Finite Automaton of Decision Tree Rules of Student Graduation and Adaptive Learning EnvironmentAce C. Lagman, Melvin A. Ballera, Jennifer O. Contreras, Jennalyn G. Raviz. 267-271 [doi]
- Overlapping community detection based on contribution value improved SLPAJun Yan, Yusheng Xu, Jingyi Zhang. 272-277 [doi]
- Discovering Dependence across Traffic Data of Disparate Regions Using Multiscale Generalized CorrelationDehong Qiu, Pin Zhang, Shaohong Fang, Xuwen Lang, Hao Feng. 278-283 [doi]
- Addressing the Task of Rocket Recycling with Deep Reinforcement LearningGuangyin Jin, Jincai Huang, Yang-He Feng, Guangquan Cheng, Zhong Liu, Qi Wang 0005. 284-290 [doi]
- Forecasting Supplies Inventory Using Sequential Pattern AnalysisCarlo G. Inovero. 291-294 [doi]
- Amaize: Automated Maize Seed Sowing Robot with Android Mobile ApplicationJohn Carlo Q. Agetano, Niña Angela T. Pamplona, Genoah Lee Hernia, Ingrid Carissa C. Obnial, Eugenia R. Zhuo. 295-300 [doi]
- Efficient Sound-source Localization Method based on Direction Estimation using 2D Microphone ArraySang-Woo Seo, Myunggyu Kim, Yejin Kim. 301-306 [doi]
- Employability Predictive Model Evaluator Using PART and JRip ClassifierTwinkle Mae C. Gatbonton, Betchie E. Aguinaldo. 307-310 [doi]
- An Analysis of the Anti-aliasing Property of Continuous Time ΣΔ Modulators from perspective of Time DomainHong-wei Ma, Jian Hui Wu. 311-315 [doi]
- Charger reservation scheme for electric vehicles based on stable marriage problem adaptationJunghoon Lee, Gyung-Leen Park. 316-319 [doi]
- Applications of An Improved Electromagnetism-like Mechanism Algorithm in Optimization of Processing ParametersQing Wu, Weigang Xu, Weijun Huang. 320-325 [doi]
- The Design and Implementation of Control Strategy and Power Modular for STATCOM ApplicationYudong Du, Yunhong Zhou, Aimin Zhang, Yang Yu, Weipeng Yang, Hang Zhang. 326-332 [doi]